Practice Free CWNA-109 Exam Online Questions
The size of the Fresnel zone is controlled by what factors? (Choose all that apply.)
- A . Antenna beamwidth
- B . RF line of sight
- C . Distance
- D . Frequency
Which management protocols are often used between a network management system (NMS) server and remote access points for the purpose of monitoring a WLAN? (Choose all that apply.)
- A . IPsec
- B . GRE
- C . CAPWAP
- D . DTLS
- E . SNMP
Prior to association, what parameter can 802.11 client devices measure and use to select the optimal access point for association?
- A . Signal strength of access point beacons received
- B . Proximity to potential access points
- C . Retry rate of probe request and response frames
- D . Average round trip time to reach the Internet DNS server
- E . Average round trip time to reach the IP router
You are being interviewed by ABC Company for employment as a wireless site survey expert. The interviewing manager asks you what items should be included in a site survey report generated as part of a manual site survey process.
What answer would be accurate? (Choose 2)
- A . Itemized list of equipment, licenses, and support contracts required for the facility
- B . RF heat map illustrating coverage and signal quality for each frequency band
- C . Documentation proving proper entry of wall material types into the site survey software
- D . Documentation noting where each access point will be placed and how it will be mounted
- E . Documentation noting how each WLAN user group will authenticate to the network
What is the final step in an effective troubleshooting process?
- A . Disable the WLAN
- B . Verify the solution
- C . Notify the users of problem resolution
- D . Document the results
Lynne runs a small hotel, and as a value added for his customers he has implemented a Wi-Fi hotspot. Lynne has read news articles about how hackers wait at hotspots trying to take advantage of unsuspecting users. He wants to avoid this problem at his hotel.
What is an efficient and practical step that Lynne can take to decrease the likelihood of active attacks on his customers’ wireless computers?
- A . Implement Network Access Control (NAC) and require antivirus and firewall software along with OS patches.
- B . Implement an SSL VPN in the WLAN controller that initiates after HTTPS login.
- C . Enable station-to-station traffic blocking by the access points in the hotel.
- D . Require EAP_FAST authentication and provide customers with a username/password on their receipt.
What information that comes from the wired network is used to assign traffic into access categories on a WLAN controller?
- A . Duration/ID
- B . 802.1D priority tags
- C . Destination MAC address
- D . Source MAC address
What are the two main components of a centralized WLAN architecture? (Choose all that apply.)
- A . WLAN controller
- B . Wireless network management system
- C . Enterprise wireless gateway
- D . Cooperative control AP
- E . Controller-based AP
802. 11ax (HE) introduces Resource Units that can be used to allow communications with multiple devices at the same time, on the same channel, in the same BSS.
What feature of 802.1 lax provides this functionality?
- A . 6 GHz support
- B . TWT
- C . Wi-Fi-LTE
- D . OFDMA
ACK and CTS frames follow which interframe space?
- A . EIFS
- B . DIFS
- C . PIFS
- D . SIFS
- E . AIFS